The layout pattern of the interconnections between computers in a network is called network topology. ... Network topology is illustrated by showing these nodes and their connections using cables. There are a number of different types of network topologies, including point-to-point, bus, star, ring, mesh, tree and hybrid.
2. Topology
The shape of a Local-Area
Network (LAN) or other
communications system.
Topologies are either Physical
or Logical.
3. Physical Topology
The physical layout of devices on a network. Every LAN
has a topology, or the way that the devices on a
network are arranged and how they communicate with
each other. The way that the workstations are
connected to the network through the actual cables that
transmit data -- the physical structure of the network --
is called the physical topology.
How the physical components on a network are connected.
(Design, Diagram & Map(
4. Logical Topology
The logical topology, also called signal topology in
contrast, is the way that the signals act on the
network media, or the way that the data passes
through the network from one device to the next
without regard to the physical interconnection of
the devices.
Logical topologies are bound to the network
protocols that direct how the data moves across a
network. The Ethernet protocol is a common
logical bus topology protocol.
Token Ring networks use a logical ring topology,
but physically they are cabled using a star
topology.
6. Bus Topology
All computers are attached to a continuous cable, or
segment
A packet is transmitted to all network adapters on that
segment
The ends of the cable must be terminated by terminators
7. BUS
When a device wants to transmit across the
bus, it has to determine whether the media is
in use.
If no other device is transmitting, the signal is
sent.
Each device receives the signal and then
determines whether its address matches that of
the recipient.
8. BUS TOPOLOGY
For e.g. System 'B' wants to transfer data to System 'G'.
First: System ‘B’ will broadcast the data to every system.
Second: System ‘G’ will make a copy of data which has been send
by system ‘B’ after that the data will be terminated.
A B C D E F G
TerminatorTerminator
9. There are three issues to consider with linear bus topology
The number of computers connected to the cable: The
more computers on the network, the more traffic there will be
on the network. These computers will compete with each other
to send data because they can only do so one at a time.
Signal bounce: signal bounce refers to an electrical property
of sending data through a cable. Without termination, an
electrical signal will bounce back and forth along the cable,
preventing all computers from sending data.
Terminators: Each end of the trunk cable needs to be
properly terminated. A terminator prevents signal bounce.
Bus topologies use coaxial cable. T connectors are often used
to connect the computer to the trunk cable.
10. BUS Topology Features
Problem: If there is
1. A break anywhere in the cable OR
2. An end is not terminated
Consequence: the signal will travel back and
forth across the network and ALL
COMMUNICATION WILL STOP.
11. BUS Topology Features
The number of computers attached to a bus also
affects network performance.
Because of the way computers communicate in a
bus topology, there may be a lot of collision or
noise.
12. BUS
The advantages of using bus include
Easy to install and configure
Inexpensive
Easily extended.
The disadvantages of using bus include
Performance degrades.
Barrel connectors used to extend the cable lengths can
weaken the signal.
Troubleshooting a bus can be quite
13. Star Topology
Cable segments from each computer on the network are
connected to a central component, or HUB.
A hub is a device that connects several computers together.
Most common network configuration in use today.
Star Topology, is the best for implementing any king of network.
14. Star Topology Features
ADVANTAGES:
If one computer on the star topology fails, the remainder
of the network functions normally.
___________________________________________
DISADVANTAGES:
Because each computer is connected to a hub, if the hub
fails, the entire network fails.
15. Types of Hub
A passive hub: is used to connect computers in a
broadcast network. The signal sent to a passive hub is sent
to all workstations with no regeneration or amplification.
An active hub: uses an external power source and
regenerates the signal before sending it out to all
workstations. Because the active hub regenerates the
signal, greater cable distances are allowed.
A switched hub :directs the signal directly to the
recipient. Switched hubs can greatly reduce network traffic.
16. Ring Topology
Computers are connected on a single circle of cable
There are no terminated ends
The signals travel around the loop in one direction and pass
through each computer, which acts as a repeater
17. Ring topology Feature
ADVANTAGE
Each computer acts as a repeater, thereby preserving
signal strength.
Handle high-traffic environments better than bus
networks.
The impact of noise is reduced in the ring topology.
DISADVANTAGE
only one computer at a time can send data on a single
token ring.
Usually more expensive than bus technologies.
18. Token Passing
The method of transmitting data around the ring
is called token passing.
A token is a special series of bits that contains
control information.
Possession of the token allows a network device to
transmit data to the network.
Each network has ONLY ONE TOKEN.
19. Concept of Ring Topology
All computers are connected by a single
cable.
In Ring Topology the ends are not terminated
and the cable forms a full loop connecting
the last computer to the first computer.
Token Passing Ring Concept.
20. The Way of Transmitting Using Token Passing
The sending computer removes the token from the ring
It sends the message around the ring.
Each computer passes along the message until the it finds
the computer that matches the address.
The receiving computer then returns a confirmation
message to the sending computer.
After verification, the sending computer creates a new
token and releases it to the network.
21. Mesh Topology
Each computer is connected to every other computer by a
separate cable
22. Mesh Topology
ADVANTAGES
If one cable fails, another carries the traffic and the
network continues to function.
On a larger scale, multiple LANs can be connected to each
other by using leased telephone lines.
DISADVANTAGES
Because redundant paths, a mesh topology can be
expensive
The number of interconnections would be more.
Difficult to implement with Big Network.
Very Complicated.
Multiple use of NIC Card in every system.
23. Hybrid Topologies
Two or more topologies are combined to form a
complete network design.
Star-bus topology.
Star-ring topology.
26. Tree Topology
Also known as a star bus topology,
tree topology is one of the most
common types of network setups
that is similar to a bus topology and
a star topology. A tree topology
connects multiple star networks to
other star networks. Below is a
visual example of a simple
computer setup on a network using
the star topology.
27.
28. A network topology that, from a purely topologic
viewpoint, resembles an interconnection of star
networks in that individual peripheral nodes are
required to transmit to and receive from one other
node only, toward a central node, and are not
required to act as repeaters or regenerators.
Note 1: The function of the central node may be
distributed
Note 2: As in the conventional star network, individual
nodes may thus still be isolated from the network by a
single-point failure of a transmission path to the node.
Note 3: A single-point failure of a transmission path
within a distributed node will result in partitioning two
or more stations from the rest of the network.
29. Physical Topology Common Protocol Common Cable
Linear Bus
Ethernet Twisted Pair
LocalTalk Coaxial
Fiber
Star
Ethernet Twisted Pair
LocalTalk Fiber
Star-Wired Ring Token Ring Twisted Pair
Tree Ethernet
Twisted Pair
Coaxial
Fiber
30. Dr. Kamal Gulati
Associate Professor |
University Quality Support Head |
Mentoring Programme Coordinator
]Ph. D., M.Sc. (Computer Science), M.C.A., M.B.A[
Professional Certifications:
Certified Microsoft Innovative Educator
Data Science 101 Certification from Big Data University
R Language 101 Certification from Big Data University
SQL Certification from SOLOLEARN.com
Certified IBM Big Data 101 from Big Data University
R Program & Python Certified from DataCamp
Wiley Certified Big Data Analyst [WCBDA[
Certification on DBMS from IIT Mumbai
Certified Cisco Certified Network Associate [CCNA[
Certified Microsoft Certified Professional [MCP[
Certified Brainbench in Computer Fundamentals, Microsoft Access, MySQL
5.7 Administration & Microsoft Project
31. •Worked as Visiting Professor with Stratford University, USA for six months
from Jan’2016 to June’2016.
•Also worked at Bahrain University in Kingdom of Bahrain Sr. I.T. Faculty
(Computer Science Department) for Period of 2 Years.
•Have rich experience in the field of teaching and research in Computer
Science and Information Technology for almost 15+ years in Academia.
•Having experience of working with both private and public institutions and
universities as the lecturer and self-instruction material writer for
Information Technology courses.
•Had number of research papers published in national and international
journals and conference proceedings in IEEE and Scopus Index.
•Also chaired various National and International Conferences of repute and
associated with various International Journals as Editorial Board Member
for International and National, Academic Adviser and Research Paper
Reviewer.
My current area of interest: Big Data Analytics, R Software, Management
Information System, IT Project Management, Decision Support System,
Business Analytics, Database Management System, Data Networking and
Advanced Excel with Visual Basic Macros.
Country Visited: USA, Canada, UK, UAE, Bahrain, Oman (Mostly for
Teaching and Research Purpose(
Profile of Dr. Kamal Gulati
32. Technical Program Committee for International Conference on Data, Engineering and
Applications 2017 (IDEA-2k17) which would be on October 28-29, 2017 at Bhopal.
http://www.ideaconference.in
Advisory Board Committee Member for International Conference on Energy,
Communication, Data Analytics and Soft Computing (ICECDS) which would be on 1-2
August 2017 at SKR Engineering College, Poonamallee, Tamil Nadu, India.http://ecds.org.in
Advisory Committee Member for International Conference on Innovative Research in
Engineering and Science which would be on 16-17 June 2017 at Asian Institute of
Technology Conference Center Thailand.http://www.iresconf.org
Advisory Committee Member for International Conference on Cloud Computing and Internet
of everything which held on 10-11 Feb’2016 at Delhi-NCR.http://www.ccioet.org
Technical Committee member for InCITe-2016 (International Conference on Information
Technology) Theme - Internet of Things: Connect Your Worlds, IT Summit, Amity
University 2016 which held on 06-07 Oct, 2016.http://www.amity.edu/incite2016
Technical Speaker for Global perspective on IT business “The Changing Scenario” – Big
Data on International Students Conference New Delhi (ISCND) which held on 14-15 Oct,
2016http://iscnd.com
Advisory Committee Member for International Conference on Sustainable Computing
Techniques in Engineering, Science and Management which has held on 09-10 Sep’2016 at
Delhi-NCR.http://www.scesm.org
Technical Program Committee Member for Program Committee Member for International
Conference on Recent Trends IN ICT, Jaipur, India, Aug 18-19, 2017 http://rtict.org
Program Committee Member for International Conference on Recent Advancement in
Computer and Communication Bhopal, India, (IC-RAC-2017) May 26-27, 2017
http://www.icrac.co.in
Profile Contd….
33. Editorial Board member for the following International
Journals:
International Journal of Computer Science and Innovation
http://www.infinitysciences.org
International Journal of Latest Research in Engineering and
Technology http://www.ijlret.com
International Journal of Latest Trends in Engineering and
Technology http://www.ijltet.org
InternationalJournalofApplicationorInnovationin
Engineering&Management http://www.ijaiem.org
International Journal for Management http://www.ijm-apm.com
ITM International Journal of Innovations in Science, Engineering
& Management www.iijisem.org
The International Journal of Emerging Engineering and
Embedded Systems http://www.ijeees.org
Conference Info http://conferenceinfo.org/tpc.php
International Journal of Computer Engineering in Research
Trends (IJCERT) http://www.ijcert.org
Expert Speaker for Program “Insurance Beyond Doubt”
Presented by Oriental Insurance Co Ltd.
https://www.youtube.com/watch?v=GrvJkN_Zn3Q
Profile Contd….
34. BOOK, CHAPTER, and CASE STUDY Published
Published Book on “A Study of Changing Trends in E-CRM
of Indian Insurance Industry” Published by LAP Lambert
Academic Publishing, one of the top researchers and
renowned scientists of Germany with ISBN: 3330009543,
9783330009547. The Book available at Amazon.com.
Published Real Case Study on “IoT Security
Considerations for Higher Education” published on
Business Cases - RENVOI 2017 BOOK (The Case Centre,
UK) with ISBN: 978-1-4828-8840-9, Page 63-70. The
Book available at the various online website: Amazon,
AbeBooks, Chegg, Barnes & Noble.
Published Chapter on "Role of eWorld in Insurance
Innovation" Published by Insurance Institute of India
(III), 60 Years Diamond Jubilee, Compendium, Nov 2016
– (Magazine) – One of the premium Insurance Institute
of India.